{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T15:03:22Z","timestamp":1761663802417,"version":"3.41.0"},"reference-count":31,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2018,8,29]],"date-time":"2018-08-29T00:00:00Z","timestamp":1535500800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"crossref","award":["61872195, 61572262 and 61402425"],"award-info":[{"award-number":["61872195, 61572262 and 61402425"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"National China 973 Project","award":["2015CB352401"],"award-info":[{"award-number":["2015CB352401"]}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Special Foundation","doi-asserted-by":"crossref","award":["2017T100297"],"award-info":[{"award-number":["2017T100297"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"crossref"}]},{"name":"MIC, Japan"},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"crossref","award":["2017M610252"],"award-info":[{"award-number":["2017M610252"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Strategic Information and Communications R8D Promotion Programme","award":["162302008"],"award-info":[{"award-number":["162302008"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Cyber-Phys. Syst."],"published-print":{"date-parts":[[2019,1,31]]},"abstract":"<jats:p>\n            In cyber-physical social systems (CPSS), a group of volunteers report data about the physical environment through their cyber devices and data aggregation is widely utilized. An important issue in data aggregation for CPSS is to protect users\u2019 privacy. In this article, we use bitwise XOR and propose a bit-choosing algorithm to realize privacy-preserving min,\n            <jats:italic>k<\/jats:italic>\n            -th min, and percentile computation. By our algorithm, the aggregator can confirm whether a user\u2019s data value is equal to certain value or within certain scale. Consequently, it is also possible to count the number of users satisfying given conditions. Our bit-choosing algorithm makes sure that the users send non-repetition replies to the aggregator to raise the aggregation accuracy. We analyze the communication cost and the achievable accuracy of our algorithm. Via performance comparison against existing protocols, the efficiency and accuracy of our algorithm are verified.\n          <\/jats:p>","DOI":"10.1145\/3145625","type":"journal-article","created":{"date-parts":[[2018,8,30]],"date-time":"2018-08-30T13:45:11Z","timestamp":1535636711000},"page":"1-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["Privacy-preserving Data Aggregation Computing in Cyber-Physical Social Systems"],"prefix":"10.1145","volume":"3","author":[{"given":"Jiahui","family":"Yu","sequence":"first","affiliation":[{"name":"Nanjing University of Posts and Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9099-2781","authenticated-orcid":false,"given":"Kun","family":"Wang","sequence":"additional","affiliation":[{"name":"Nanjing University of Posts and Telecommunications, China"}]},{"given":"Deze","family":"Zeng","sequence":"additional","affiliation":[{"name":"China University of Geosciences, China"}]},{"given":"Chunsheng","family":"Zhu","sequence":"additional","affiliation":[{"name":"University of British Columbia, Canada"}]},{"given":"Song","family":"Guo","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University, China"}]}],"member":"320","published-online":{"date-parts":[[2018,8,29]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1525856.1525858"},{"volume-title":"Proceedings of the Annual Network 8 Distributed System Security Symposium (NDSS\u201911)","author":"Chan H.","key":"e_1_2_1_2_1","unstructured":"H. Chan , E. Shi , E. Rieffel , R. Chow , and D. Song . 2011. Privacy-preserving aggregation of time-series data . In Proceedings of the Annual Network 8 Distributed System Security Symposium (NDSS\u201911) . Retrieved from http:\/\/hdl.handle.net\/10722\/135709. H. Chan, E. Shi, E. Rieffel, R. Chow, and D. Song. 2011. Privacy-preserving aggregation of time-series data. In Proceedings of the Annual Network 8 Distributed System Security Symposium (NDSS\u201911). Retrieved from http:\/\/hdl.handle.net\/10722\/135709."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2014.2386615"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814442"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSUSC.2017.2715038"},{"volume-title":"Proceedings of the IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM\u201912)","author":"El-Tawab S.","key":"e_1_2_1_6_1","unstructured":"S. El-Tawab , S. Olariu , and M. Almalag . 2012. Friend: A cyber-physical system for traffic flow related information aggregation and dissemination . In Proceedings of the IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM\u201912) . 1--6. S. El-Tawab, S. Olariu, and M. Almalag. 2012. Friend: A cyber-physical system for traffic flow related information aggregation and dissemination. In Proceedings of the IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM\u201912). 1--6."},{"key":"e_1_2_1_7_1","unstructured":"R. Eleanor B. Jacob M. William and L. Adam. 2010. Secured histories: Computing group statistics on encrypted data while preserving individual privacy. CoRR abs\/1012.2152 (2010). Retrieved from http:\/\/arxiv.org\/abs\/1012.2152.  R. Eleanor B. Jacob M. William and L. Adam. 2010. Secured histories: Computing group statistics on encrypted data while preserving individual privacy. CoRR abs\/1012.2152 (2010). Retrieved from http:\/\/arxiv.org\/abs\/1012.2152."},{"volume-title":"Proceedings of the International Conference on Wireless Networks. 186--192","author":"Ertaul L.","key":"e_1_2_1_8_1","unstructured":"L. Ertaul and V. Kedlaya . 2007. Computing aggregation function minimum\/maximum using homomorphic encryption schemes in wireless sensor networks (WSNs) . In Proceedings of the International Conference on Wireless Networks. 186--192 . L. Ertaul and V. Kedlaya. 2007. Computing aggregation function minimum\/maximum using homomorphic encryption schemes in wireless sensor networks (WSNs). In Proceedings of the International Conference on Wireless Networks. 186--192."},{"key":"e_1_2_1_9_1","volume-title":"Proceedings of the IEEE International Conference on Computer Communications (INFOCOM\u201911). 2024","author":"Groat M. M.","year":"2032","unstructured":"M. M. Groat , W. Hey , and S. Forrest . 2011. KIPDA: k-indistinguishable privacy-preserving data aggregation in wireless sensor networks . In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM\u201911). 2024 -- 2032 . M. M. Groat, W. Hey, and S. Forrest. 2011. KIPDA: k-indistinguishable privacy-preserving data aggregation in wireless sensor networks. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM\u201911). 2024--2032."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.237"},{"key":"e_1_2_1_11_1","volume-title":"Proceedings of the IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW\u201916)","author":"Huang C.","year":"1802","unstructured":"C. Huang , J. Marshall , D. Wang , and M. Dong . 2016. Towards reliable social sensing in cyber-physical-social systems . In Proceedings of the IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW\u201916) . 1796-- 1802 . C. Huang, J. Marshall, D. Wang, and M. Dong. 2016. Towards reliable social sensing in cyber-physical-social systems. In Proceedings of the IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW\u201916). 1796--1802."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2015.7410266"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/2992856.2992858"},{"key":"e_1_2_1_14_1","unstructured":"H. Li K. Wang X. Liu Y. Sun and S. Guo. 2017. A selective privacy preserving approach for multimedia data. IEEE Multimedia 99 (June 2017) 1--1.  H. Li K. Wang X. Liu Y. Sun and S. Guo. 2017. A selective privacy preserving approach for multimedia data. IEEE Multimedia 99 (June 2017) 1--1."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2012.6459985"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2015.2512500"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.86"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPA.2011.34"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807247"},{"key":"e_1_2_1_20_1","first-page":"1","article-title":"Learning automata-based data aggregation tree construction framework for cyber-physical systems","volume":"99","author":"Ren J.","year":"2016","unstructured":"J. Ren , G. Wu , X. Su , G. Cui , F. Xia , and M. S. Obaidat . 2016 . Learning automata-based data aggregation tree construction framework for cyber-physical systems . IEEE Syst. J. 99 (2016), 1 -- 13 . J. Ren, G. Wu, X. Su, G. Cui, F. Xia, and M. S. Obaidat. 2016. Learning automata-based data aggregation tree construction framework for cyber-physical systems. IEEE Syst. J. 99 (2016), 1--13.","journal-title":"IEEE Syst. J."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2013.18"},{"volume-title":"Proceedings of the IEEE International Conference on Computer Communications (INFOCOM\u201910)","author":"Shi J.","key":"e_1_2_1_22_1","unstructured":"J. Shi , R. Zhang , Y. Liu , and Y. Zhang . 2010. PriSense: Privacy-preserving data aggregation in people-centric urban sensing systems . In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM\u201910) . 1--9. J. Shi, R. Zhang, Y. Liu, and Y. Zhang. 2010. PriSense: Privacy-preserving data aggregation in people-centric urban sensing systems. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM\u201910). 1--9."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.1600113NM"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2886100"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2017.1600191"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.7721739"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.7389829"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2017.2702176"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1132905.1132944"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2017.2761386"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2432814"}],"container-title":["ACM Transactions on Cyber-Physical Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3145625","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3145625","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:00Z","timestamp":1750212660000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3145625"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,29]]},"references-count":31,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,1,31]]}},"alternative-id":["10.1145\/3145625"],"URL":"https:\/\/doi.org\/10.1145\/3145625","relation":{},"ISSN":["2378-962X","2378-9638"],"issn-type":[{"type":"print","value":"2378-962X"},{"type":"electronic","value":"2378-9638"}],"subject":[],"published":{"date-parts":[[2018,8,29]]},"assertion":[{"value":"2017-02-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-09-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-08-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}